Splunk Search

Pushing certain syslog messages to an Index

dcroteau
Splunk Employee
Splunk Employee

Trying to separate leostream "broker" events that come from syslog into it's own separate index called leostream. Why is this not working? They go into the main index. I've tried the regex with and without the parentheses.

<timestamp whatever> Broker: 111.111.111.111 bla bla bla bla

Any help would be great!

indexes.conf

[leostream]
coldPath = $SPLUNK_DB/leostream/colddb
homePath = $SPLUNK_DB/leostream/db
thawedPath = $SPLUNK_DB/leostream/thaweddb

Props.conf

[syslog]
TRANSFORMS-leostream_data = LEOSTREAM

Transforms.conf

[LEOSTREAM]
REGEX = (111.111.111.111)
DEST_KEY = _MetaData:Index
FORMAT = leostream
Tags (3)
0 Karma

satishp
Explorer

I have same problem. any solution community ?

0 Karma

dcroteau
Splunk Employee
Splunk Employee

No, syslog.conf is set to my indexer over UDP 514. Very basic input setting. No forwarder involved.

0 Karma

riqbal
Communicator

I am forwarding syslog logs to central syslog server. then central syslog server is sending logs to UF.

How can I send the logs to specific index

0 Karma

ftk
Motivator

Did you restart the splunk instance after setting this up? Are you sending the syslog data to the indexer directly or to a forwarder?

0 Karma

riqbal
Communicator

UF is installed on my syslog server and UF is configured to forward logs to HF.
where should I configure index configuration.

0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...